Machine Learning Based Password Strength Analysis
Creators
- 1. Assistant Professor, Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
- 2. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
- 3. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
Contributors
Contact person:
- 1. Department of Information Science and Engineering, New Horizon College of Engineering, Bangalore (Karnataka) India.
Description
Abstract: Passwords, as the most used method of authentication because to its ease of implementation, allow attackers to get access to the accounts owned by others by means of cracking passwords. This is cause of the similar patterns that users use to create a password, like dictionary words, common phrases, person and location names, keyboard pattern, and so on. Multiple password cracking techniques had been introduced to predict the password offline or online, with the majority of records say the one with weak password or familiar password patterns being cracked. This suggested prototype implements numerous machine learning methods such as Decision Tree (DT), Nave Bayes (NB), Logistic Regression (LR), and Random Forest (RF) on a web application in real time to force users to choose a secure password. This results in the user's account being logged into if particularly the password strength from more than half of the algorithms is strong.
Notes
Files
H91190711822.pdf
Files
(431.0 kB)
Name | Size | Download all |
---|---|---|
md5:ab0fd09ebe41a3d0696d6b97d0aebb53
|
431.0 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2278-3075 (ISSN)
References
- Grassi P.A., Garcia M., Fenton J. NIST Special Publication 800–63–3 Digital Identity Guidelines National Institute of Standards and Technology, Los Altos, CA (2020)
- Zhou Huan, Liu Qixu, Cui Xiang, Zhang Fangjiao. Research on Targeted Password Guessing Using Neural Networks. Journal of Cyber Security. 2018. 3(5): p. 25-37.
- M. Weir, S. Aggarwal, B. d. Medeiros and B. Glodek, "Password Cracking Using Probabilistic Context-Free Grammars," 2009 30th IEEE Symposium on Security and Privacy, Berkeley, CA, 2009, pp. 391-405, doi: 10.1109/SP.2009.8.
- J. Blocki, B. Harsha and S. Zhou, "On the Economics of Offline Password Cracking," 2018 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, 2018, pp. 853-871, doi: 10.1109/SP.2018.00009.
- Melicher, W., et al., Better passwords through science (and neural networks). ; 2017. 42(4)
- A LeCun, Y., Y. Bengio, and G. Hinton, Deep learning. Nature, 2015. 521(7553): pp. 436-444.
- B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass, M. L. Mazurek, T. Passaro, R. Shay, T. Vidas, L. Bauer, N. Christin, and L. F. Cranor, "How does your password measure up? The effect of strength meters on password creation," in Proceedings of the 21st USENIX conference on Security symposium, ser. USENIX-SS '12. USENIX Association, 2012, pp. 65–80.
- S. J. Pan and Q. Yang, "A Survey on Transfer Learning," in IEEE Transactions on Knowledge and Data Engineering, vol. 22, no. 10, pp. 1345-1359, Oct. 2010, doi: 10.1109/TKDE.2009.191. Workshop (NSPW '05), pp. 67-72, Sept. 2005.
Subjects
- ISSN: 2278-3075 (Online)
- https://portal.issn.org/resource/ISSN/2278-3075#
- Retrieval Number: 100.1/ijitee.H91190711822
- https://www.ijitee.org/portfolio-item/h91190711822/
- Journal Website: www.ijitee.org
- https://www.ijitee.org/
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org/